CVE Vulnerabilities

CVE-2018-0732

Published: Jun 12, 2018 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl1.0.2 (including)1.0.2o (including)
OpensslOpenssl1.1.0 (including)1.1.0h (including)
JBoss Core Services Apache HTTP Server 2.4.29 SP2RedHat*
JBoss Core Services Apache HTTP Server 2.4.29 SP2RedHatopenssl*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7*
Red Hat Enterprise Linux 7RedHatopenssl-1:1.0.2k-16.el7*
Red Hat OpenShift Application Runtimes Node.js 10RedHatrhoar-nodejs-1:10.9.0-1.el7*
Red Hat OpenShift Application Runtimes Node.js 8RedHatrhoar-nodejs-1:8.11.4-2.el7*
OpensslUbuntuartful*
OpensslUbuntubionic*
OpensslUbuntucosmic*
OpensslUbuntudevel*
OpensslUbuntudisco*
OpensslUbuntuesm-infra-legacy/trusty*
OpensslUbuntuesm-infra/bionic*
OpensslUbuntuesm-infra/xenial*
OpensslUbuntutrusty*
OpensslUbuntutrusty/esm*
OpensslUbuntuxenial*
Openssl098Ubuntutrusty*
Openssl1.0Ubuntubionic*
Openssl1.0Ubuntucosmic*
Openssl1.0Ubuntuesm-infra/bionic*

References